Modeling devices using port scan

You can model IP services by doing a port scan, using
the Nmap Security Scanner. You must
provide the full path to your system's nmap command.

To determine where nmap is installed, at the command line, enter:

which nmap

If your system returns a result similar to:

/usr/bin/which: no nmap in (/opt/zenoss/bin:/usr/kerberos/bin:/usr/local/bin:/bin:/usr/bin:/opt/zenoss/bin)

then nmap is not installed. Install it, and then try again.

After locating the nmap command (including the directory beginning
with /), enter the following as the zenoss user on the Resource Manager server:

cd $ZENHOME/libexec ln -s
Full_Path_to_nmap

Note: To execute a command using $ZENHOME
(/opt/zenoss for the zenoss user), you must be attached to the
container holding the Resource Manager application. See the Control Center
documentation for serviced commands.

To model a device
using a port scan:

Select the device in the device list.

In the left panel, select Modeler Plugins.

Select the zenoss.nmap.ipServiceMap plugin in the list of Available
plugins, and then use the right arrow control to move it to the list of Selected
plugins.